General

  • Target

    7589df6fc73705e680ebb569b62e9ac1517ed7f50ce4131e7fde26cdbacc9db2

  • Size

    693KB

  • Sample

    220417-t3sf4sahfj

  • MD5

    08a19101e1128428702d7dd9f509bebd

  • SHA1

    0d69fcb18412ad3216ce0ba4d8a3fdf36510d5c7

  • SHA256

    7589df6fc73705e680ebb569b62e9ac1517ed7f50ce4131e7fde26cdbacc9db2

  • SHA512

    12a9fe8a62323b65a9c0a85f29fb05eaba22c557b5e7bbc246c3092ea17f5bd4be7a61596d3b597c447ac33d3dd6b649c40b462571c2e825d990ffdbd0d8cb28

Malware Config

Targets

    • Target

      7589df6fc73705e680ebb569b62e9ac1517ed7f50ce4131e7fde26cdbacc9db2

    • Size

      693KB

    • MD5

      08a19101e1128428702d7dd9f509bebd

    • SHA1

      0d69fcb18412ad3216ce0ba4d8a3fdf36510d5c7

    • SHA256

      7589df6fc73705e680ebb569b62e9ac1517ed7f50ce4131e7fde26cdbacc9db2

    • SHA512

      12a9fe8a62323b65a9c0a85f29fb05eaba22c557b5e7bbc246c3092ea17f5bd4be7a61596d3b597c447ac33d3dd6b649c40b462571c2e825d990ffdbd0d8cb28

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Payload

      Detects Dridex x64 core DLL in memory.

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks